Detailed analysis of security vulnerabilities
An SSH server allows authentication through the .rhosts file.